Cyber threats Whitepapers


Sort by: Date | Company | Title


Internet Security Threat Report
By Symantec | 25/8/2016

Symantec has established one of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 63.8 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services, such as Symantec DeepSight™ Intelligence, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources.

Download this now


Australia's Internet Security Threat Profile
By Symantec | 25/8/2016

Symantec’s 2015 Internet Security Threat Report identifies the vulnerabilities leaving Australian businesses exposed. Using information gathered through Symantec’s Global Intelligence Network, the annual report provides enterprises, small businesses, and consumers with essential information to secure their systems effectively now and into the future.

Download this now


Application Usage and Threat Report
By Palo Alto Networks | 5/1/2015

The Application Usage and Threat Report (June 2014) provides a global view into enterprise application usage and the associated cyber threat landscape. Accomplished by summarizing network traffic assessments conducted across more than 5,500 organizations worldwide between March 2013 and March 2014.

This version of the report will analyse the relationship between threats and their application vectors. The most surprising data points being both the diversity of applications displaying threat activity and the high concentration of activity surrounding only a few key techniques.

Download this now


How Threat Actors Steal Your Data
By Trend Micro Australia | 23/9/2013

Advanced Persistent Threats strive to remain undetected in the network in order to gain access to the valuable data. Once in, it can be an arduous task for system administrators to detect any malicious activity in the network. In this whitepaper, we look at the methods used for malicious activity and what efforts can be taken to mitigate the problem.

Download this now


Targeted Attack Campaigns
By Trend Micro Australia | 23/9/2013

Advanced Persistent Threats (APTs) refer to a category of threats that aggressively pursue and chosen targets that over time attempt to get deeper into their network. For Enterprises, this is a high priority threat as human and systemic weaknesses can be mitigated with correct practices and solutions. In this report we look at targeted attack campaigns and how these can be mitigated.

Download this now


Local Government Finds Economies of Scale for Virtualised Environment and Secures Multiple Access Points
By Trend Micro Australia | 1/8/2013

The City of Rockingham is the second largest city in Western Australia with more than 100,000 residents. They needed a cost effective solution to identify and take swift aversive action against cyber threats that enter their network or those that come-in via their growing number of Public Access Points – used by a myriad of wireless access devices. Download to find out how they met this business challenge.

Download this now


Prioritising Security Intelligence through Security-As-A-Service
By IBM Australia | 26/7/2013

‘Security intelligence’ is a term that is commonly used within the information security community, but one that often lacks clarity and definition. In this market review by Forrester, we look at the growth of security-as-a-service (SAAS) solutions and the challenges in implementing this change. Click to download.

Download this now


IT Executive Guide to Security Intelligence
By IBM Australia | 25/7/2013

Security intelligence, built upon the same concepts that have made business intelligence an essential enterprise technology, is the critical next step for organizations that recognize the importance of information security to their business health. In this white paper, we discuss how security intelligence address these shortcomings and empower organisations, from Fortune Five companies and mid-size enterprises to government agencies, to maintain comprehensive and cost-effective information security. Read now.

Download this now


2012 Mid-Year Trend and Risk Report
By IBM Australia | 25/7/2013

Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents, continue their upward trajectory and have already hit new highs in 2011. Click to download!

Download this now


Detecting the Enemy Inside the Network - How Tough Is It?
By Trend Micro Australia | 22/10/2012

Advanced persistent threats (APTs) refer to a category of threats that pertain to computer intrusions by threat actors that aggressively pursue and compromise chosen targets. APTs are often conducted in campaigns, which consist of a series of failed and successful attempts over time to get deeper and deeper into a target’s network and are therefore not isolated incidents. Download to find out more!

Download this now
[]